• Title/Summary/Keyword: Transpose

Search Result 58, Processing Time 0.021 seconds

Nationalizing Transnationalism: A Comparative Study of the "Comfort Women" Social Movement in China, Taiwan, and South Korea

  • Alvarez, Maria del Pilar
    • Journal of Contemporary Eastern Asia
    • /
    • v.19 no.1
    • /
    • pp.8-30
    • /
    • 2020
  • Most literature on the "comfort women" social movement focuses on the case of Korea. These works tend to transpose the meanings generated by South Korean organizations onto the transnational network, assuming certain homogeneity of repertoires and identities among the different social actors that comprise this network. Even though there is some degree of consensus about demands, repertoires, and advocacy strategies at the international level, does this same uniformity exist at the national level? In each country, what similarities and differences are present in the laboratories of ideas, relationships, and identities of social actors in the network? Symbolically and politically, do they challenge their respective societies in the same way? This article compares this social movement in South Korea, China, and Taiwan. My main argument is that the constitutive base for this transnational network is the domestic actions of these organizations. It is in the domestic sphere that these social actors reinforce their agendas, reinvent their repertoires, transform their identities, and expand their submerged networks, allowing national movements to retain their latency and autonomy. Following Melucci's relational approach to the study of social movements, this research is based on a qualitative analysis of institutional documents, participant observation, and open-ended interviews with members of the main social actors.

Treatment of Painful Hand Neuroma : To Make a Loop to Transpose the Nerve Ending to the Side of its Proximal Stump - Case Report - (수부 신경종의 치료 : 고리 모양의 단.측 신경봉합술의 이용 - 증례 보고 -)

  • Ko, Ra-Yong;Oh, Kap-Sung
    • Archives of Reconstructive Microsurgery
    • /
    • v.8 no.1
    • /
    • pp.92-96
    • /
    • 1999
  • Neuroma is formed by abnormal, incomplete nerve regeneration after nerve injury. A painful neuroma in the hand can be psychologically and physically disabling. The goal of treating painful neuroma is to relieve pain and to restore nerve function. A numerous treatment modality was reported for alleviating the problem. These treatments include crushing the neuroma, ligating it, burying in soft tissue, bone, and muscle, injecting it with alcohol, phenol, and steroid, capping it with silicone cuff. But, none of these methods has been uniformly successful, although each has its advocates. No one technique reliably prevents formation of a painful neuroma. However, the principles of treatment is resection of neuroma and proximal stump of the nerve is transposed to appropriate adjacent tissue. Our current technique was resection of neuroma with partial normal neural tissue, and then the nerve ending was transposed and sutured to the side of the proximal stump with 10-0 nylon, so end-to-side neurorrhaphy was made. The nerve ending had to be placed and fixed into the proximal nerve epineurium like as a figure of a loop. We believe this technique is another useful method for the treatment of painful neuroma.

  • PDF

Stuides on the Cutting Methods of the Self-feeding Type Combine -on the Mixed Cutting Method (1)-on the Mixed Cutting Method(I) (자탈형 콤바인의 예취작업법에 관한 연구 -혼합예취법을 중심으로 (제1보)-)

  • 최복연
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.18 no.2
    • /
    • pp.4096-4104
    • /
    • 1976
  • This experiment was carried out to investigate the efficient turning method which will be able to use every cutting methods, to calculate the width of the center field which must transpose from rotary cutting method to return cutting method, to investigate the effects of L/W and unit field on the operation efficiency. The results are summarized as follows: 1. In case of cutting in the outer field, the efficient turning method is the "$\alpha$" type turning method (half U-shaped turning method) at the first rotation, is the "$\beta$" type turning method (T-shaped turning method) at the second to fourth rotation. 2. In case of cutting in the inner field, the efficient turning method which takes the least turning time is the "a" type turning method ($\Delta$-shaped turning method). 3. The width of the center field (W') changes by the length-width ratio (L/W) and width (W), W' is 9.0m in case that L/W is 2.5 and W is 30m. 4. The larger L/W and area of unit field (A) become, the more operation efficiency (E) increases, and the limits that E is affected signicantly by L/W is 2 to 3.5 and A is within 5,000$m^2$. within 5,000$m^2$.

  • PDF

A Method Using Linear Matrix Algebra for Determination of Engine Motion in Automobile (자동차 엔진의 운동변위 결정을 위한 선형행렬연산법)

  • Ko, B.G.;Lee, W.I.;Park, G.J.;Ha, S.K.
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.2 no.1
    • /
    • pp.116-127
    • /
    • 1994
  • A method using the linear matrix algebra is developed in order to determine unknown external forces in linear structural analyses. The method defines a matrix which represents the linearity of the vibrational analysis for a structural system. The unknown external forces are determined by the operations of the matrix. The method is applied to find an engine motion in an automobile system. For a simulation process, an exhaust system is modeled and analyzed by the finite element method. The validity of the simulation is verified by comparing with the experimental results the free vibration. Also, an experiment on the forced vibration is performed to determine the damping ratio of the exhaust sysetm. Estimated model parameters(natural frequency, mode shape) are in accord with the experimental results. Because the method merely repeats the transpose and inverse operations of a matrix, the solution is extremely easy and simple. Moreover, it is more accurate than the existing methods in that there is no artificial assumptions in the calculation processes. Therefore, the method is found to be reliable for the analysis of the exhaust system considering the characteristics of vibrations. Although the suggested method is tested by only the exhaust system here, it can be applied to general structures.

  • PDF

A study on development of CATIA V5 file security system using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae H.C.;Park D.S.;Byun J.H.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.417-418
    • /
    • 2006
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. The best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function, A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

  • PDF

A Study on Development of CATIA V5 File Security System Using CAA (CAA를 이용한 CATIA V5 파일보안시스템 개발에 관한 연구)

  • Chae, Hee-Chang;Park, Doo-Seob;Byun, Jae-Hong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.5
    • /
    • pp.77-81
    • /
    • 2007
  • CATIA V5 is one of the most preferred softwares in product design for domestic and industrial use. But with the development of the IT industry, design data by CATIA V5 can easily be hacked and stolen especially via the internet and through assistance storage medium. The design data could be protected through executive, physical and technical security system. the best way to maintain confidentiality of data from unauthorized access is to have a cryptosystem of the technical security. In this paper, a cryptosystem for the protection of design data was being proposed. The memory contains the file information made by the New and Open function of CATIA V5. No error can be expected even if the file changed before of after the application of Save and Open function. A cryptosystem was constructed in CATIA V5 by inserting crypto algorithm before and after the I/O process. The encryption/decryption algorithm of each function was based on the complex cipher, which applied permutation cipher and transpose cipher. The file security system was programmed in CAA V5 and Visual C++.

Singularity Avoidance Algorithms for Controlling Robot Manipulator: A Comparative Study (로봇 메니퓰레이터의 제어를 위한 특이점 회피 알고리즘의 비교 연구)

  • Kim, Sanghyun;Park, Jaeheung
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.1
    • /
    • pp.42-54
    • /
    • 2017
  • Using an inverse of the geometric Jacobian matrix is one of the most popular ways to control robot manipulators, because the Jacobian matrix contains the relationship between joint space velocities and operational space velocities. However, the control algorithm based on Jacobian matrix has algorithmic singularities: The robot manipulator becomes unstable when the Jacobian matrix loses rank. To solve this problem, various methods such as damped and filtered inverse have been proposed, but comparative studies to evaluate the performance of these algorithms are insufficient. Thus, this paper deals with a comparative analysis of six representative singularity avoidance algorithms: Damped Pseudo Inverse, Error Damped Pseudo Inverse, Scaled Jacobian Transpose, Selectively Damped Inverse, Filtered Inverse, and Task Transition Method. Especially, these algorithms are verified through computer simulations with a virtual model of a humanoid robot, THORMANG, in order to evaluate tracking error, computational time, and multiple task performance. With the experimental results, this paper contains a deep discussion about the effectiveness and limitations of each algorithm.

Fabrication and Test of Multiple HTS Wire with Transposition for HTS Power Transformer

  • Kim, Woo-Seok;Park, Chan;Choi, Kyeong-Dal
    • Progress in Superconductivity and Cryogenics
    • /
    • v.10 no.2
    • /
    • pp.34-37
    • /
    • 2008
  • According to the recent design of an HTS (High Temperature Superconducting) power transformer whose capacity is hundreds MVA, the rated current values of the low voltage side are generally over thousands amps. Considering the performance of the recent HTS wires, it is inevitable to use several HTS wires in parallel for large rated current. Lots of stacked HTS wires were fabricated and tested so far, and the results have showed that we have to transpose each wire in order to reduce the AC losses as well as to increase the current capacity. But many development programs about HTS transformers reveal that the transposition of the several wires during the winding process is quite difficult not only in case of the layer windings but also in case of the pancake type ones. So, we need transposed multiple HTS wire which we can handle like single wire or cable for the HTS windings of large capacity power transformer. We fabricated several kinds of samples of multiple HTS wire with transposition to apply it to the HTS windings of power transformer. The electrical characteristics such as critical currents or AC losses are analyzed by experiments in case by case. Finally we present the best design of a multiple HTS wire for power transformer.

Reduction Characteristics on Perpendicular Magnetization Loss in Transposed Stacking Conductor of Striated YBCO CC (분할형 YBCO CC들을 전위한 적층도체의 수직 자화손실 저감 특성)

  • Lee, J.K.;Byun, S.B.;Han, B.W.;Park, S.H.;Choi, S.J.;Kim, W.S.;Park, C.;Choi, K.D.
    • Progress in Superconductivity and Cryogenics
    • /
    • v.11 no.3
    • /
    • pp.15-19
    • /
    • 2009
  • Recently, it is proposed to make striations on the YBCO coated conductor and to transpose each other as one of the solutions to decrease the perpendicular magnetization loss. For large power application using HTS, the stacked conductor packing the YBCO coated conductors should be used because single conductor is limited in flowing of demanded large current. In this paper, we research the affect of the striation and continuously transposed stacking geometry on the magnetization loss in perpendicularly exposed magnetic field. Several short samples having different number of striation and continuously transposed stack are prepared and tested in perpendicularly exposed magnetic field for the magnetization loss characteristics. The magnetization loss of striated sample was lower than sample without striation. The reduction effect on magnetization loss by the striation is obviously appeared in higher field and lower number of stack and decreased as increasing the transposed stacking number. Also, the reduction effect by transposed stack is obviously appeared in lower field at lower number of striation and isn't appeared at higher striation number and higher magnetic field.

High Throughput Parallel Design of 2-D $8{\times}8$ Integer Transforms for H.264/AVC (H.264/AVC 를 위한 높은 처리량의 2-D $8{\times}8$ integer transforms 병렬 구조 설계)

  • Sharma, Meeturani;Tiwari, Honey;Cho, Yong-Beom
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.8
    • /
    • pp.27-34
    • /
    • 2012
  • In this paper, the implementation of high throughput two-dimensional (2-D) $8{\times}8$ forward and inverse integer DCT transform for H.264 is presented. The forward and inverse transforms are represented using simple shift and addition operations. Matrix decomposition and matrix operation such as the Kronecker product and direct sum are used to reduce the computation complexity. The proposed design uses integer computations and does not use transpose memory and hence, the resource consumption is also reduced. The maximum operating frequency of the proposed pipelined architecture is 1.184 GHz, which achieves 25.27 Gpixels/sec throughput rate with the hardware cost of 44864 gates. High throughput and low hardware makes the proposed design useful for real time H.264/AVC high definition processing.